Additional Material for the Mobile Forensics Course
☆18Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for MobileForensics
Users that are interested in MobileForensics are comparing it to the libraries listed below
Sorting:
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆151Mar 20, 2024Updated last year
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆174Mar 31, 2023Updated 2 years ago
- Python scripts for doing Android or IOS mobile forensics☆25Sep 28, 2016Updated 9 years ago
- Binaries for the log2timeline projects and dependencies☆40Feb 8, 2026Updated 2 weeks ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆116Feb 21, 2018Updated 8 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Integration module offering a consistent, simple, and streamlined approach to interacting with the BigFix suite of products and APIs dire…☆11Oct 21, 2021Updated 4 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- Dump the iOS Frequent Location binary plist files☆89Nov 4, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- ☆14Jun 11, 2022Updated 3 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- mift - a mobile image forensic toolkit☆46Nov 14, 2023Updated 2 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- B3-CoinV2☆11Nov 14, 2017Updated 8 years ago
- ADB Based Acquisition Tool for Android Forensics☆43Mar 30, 2021Updated 4 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- 从http://ggjd.cnstock.com/ 抓取股票的午间公告☆10Aug 1, 2016Updated 9 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- Some collection of router firmware tools☆11Aug 4, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 8 years ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Python for Penetration Testers, published by Packt☆14Jan 30, 2023Updated 3 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago